Is Your Company Ready for Mobile Tech Gifts?
With so many challenges associated with each mobile device, the proliferation of options is forever changing the traditional role of information technology (IT). Business unit and IT leaders have to...
View Article9 Ways to Ensure Mobile Device Security
Mobile security usually begins with protecting the actual mobile device. Protecting the device itself is one of the critical elements of a successful mobile security plan.When a mobile phone has been...
View ArticleCritical Elements of a Successful Mobile Security Plan
The proliferation of mobile devices has forever changed the rules. While IT departments have traditionally set hard-and-fast guidelines for connecting to corporate networks, many now find themselves...
View ArticleSecuring the Enterprise: Is Your IT Organization under Siege?
Enterprise IT departments today are facing a never-ending, always-increasing global onslaught of security threats, at a time when budgets have either been frozen or slashed. From 2006 to 2011, there...
View ArticleHow to Create a Mobile Device Management Strategy
Like it or not, enterprise IT organizations are quickly realizing that mobile devices are eclipsing PCs and laptops as the devices of choice for employees in the workplace and beyond. Mobile devices...
View Article8 Steps to an Effective Vulnerability Assessment
Cybercrime has been in the news lately, with major publicized attacks on LinkedIn, CBS, FOX, NASA, the FBI and dozens of other high-profile organizations. Many of these attacks have taken advantage of...
View Article10 Steps to a Successful BYOD Strategy
It used to be that businesses drove the pace of technology adoption, but times have changed. Mobile devices have transformed the way people perform everyday tasks, and users are now the first to get...
View ArticleCombating Advanced Persistent Threats
Once upon a time, security was easier. Corporate information assets were tucked behind a firewall, secure within the physical confines of the data center. We had a strong set of access controls...
View Article5 Mobile Security Threats
The consumerization of information technology (IT) has led to the growth of the bring-your-own-device (BYOD) environment. Because rather than using company-issued and company-controlled computers that...
View Article3 Steps to BYOD Security
In the mad rush to address the consumerization of IT, it’s tempting to quickly plug in untested security plans that may or may not be the best fit for your organization.Successful enterprise IT...
View ArticleIs Your Data Security Strategy Staying Ahead of Today's Cyber Security Threats?
It may seem strange to say, but there are probably a lot of people involved in IT security who long for the “good old days” when the threats were limited to computer viruses getting downloaded...
View ArticleProtecting Data in the New Workspace
The growing occurrence of data breaches is making 2014 a critical year for companies to better prepare for and respond to cyber attacks. And in today’s hyper-connected world, collaborating with users...
View ArticleIdentity and Access Management: Defining the New Security Perimeter
One of the staples of a good espionage thriller is the main character’s ability to change identities. Whether it is to gain access to a secret facility, perform a daring rescue or slip quietly past...
View ArticleMobile Device Security in the Workplace: 5 Key Risks and a Surprising Challenge
Employees aren't just bringing their mobile devices to the workplace — they're living on them. A 2015 study by Bank of America found that 55 percent of respondents sleep with their smartphones on...
View Article
More Pages to Explore .....